RSA Archer eGRC Multiple Bugs
Severity Rating: Medium
Multiple vulnerabilities were reported in RSA Archer eGRC and they can be exploited by remote attackers to upload files, gain elevated privileges and conduct cross-site scripting attacks. The vulnerabilities exist because the software does not properly filter HTML code from user-supplied input before displaying the input. These can allow a remote user to cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the RSA Archer eGRC software and will run in the security context of that site. As a result, the code will be able to access the target user's cookies associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.
The vulnerabilities reported are as follows:
The Questionnaire ID field is affected
The Source Asset ID field is affected
The request URL parameter is affected
Certain RSA Archer Help pages are affected
A remote user can upload files to arbitrary paths on the target system
A remote authenticated user can gain elevated privileges on the target system. This can be exploited to export certain application records.
Users are advised to apply updates.
More information is available on:
Mauritian Computer Emergency Response Team (CERT-MU)
National Computer Board
7th Floor, Stratton Court
La Poudriere Street